Overview
overview
10Static
static
3bf244a0d9a...18.exe
windows7-x64
10bf244a0d9a...18.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3405.htm
windows7-x64
3405.htm
windows10-2004-x64
3SetCursor.dll
windows7-x64
3SetCursor.dll
windows10-2004-x64
3getOpenDocumentIDs.js
windows7-x64
3getOpenDocumentIDs.js
windows10-2004-x64
3General
-
Target
bf244a0d9ac81f0ca62e5b3ddfb7b72c_JaffaCakes118
-
Size
218KB
-
Sample
241203-zgxrlaymgl
-
MD5
bf244a0d9ac81f0ca62e5b3ddfb7b72c
-
SHA1
ecbdbcfab600d5cfc2a1ce67bd5a1819ae340a33
-
SHA256
9abffaee18a87032e9db459d1309da167460acdd98dfc4c7fc4c3941f2cbbaf9
-
SHA512
d2f5d096b09446cb2c5ea99c33dad75b47e76cc5b0509c6d9d571d89b6f245ef86b3c63e4958d2766ef11f4483fb78af3cba49354912ed7c1f8a5497def44a53
-
SSDEEP
3072:2ELO8OxPh5XJkC456AhqDpl1nBTVS7R9WsL2VaAsJmzcsxoY9N/M75kDthsQxMWi:2EcNCCBAhqDNu7RhL2oAsUj/DgQxa
Static task
static1
Behavioral task
behavioral1
Sample
bf244a0d9ac81f0ca62e5b3ddfb7b72c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bf244a0d9ac81f0ca62e5b3ddfb7b72c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
405.htm
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
405.htm
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
SetCursor.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SetCursor.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
getOpenDocumentIDs.js
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
getOpenDocumentIDs.js
Resource
win10v2004-20241007-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\# DECRYPT MY FILES #.html
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\# DECRYPT MY FILES #.txt
cerber
http://pmenboeqhyrpvomq.wz139z.top/67F5-5E77-3351-006D-F89C
http://pmenboeqhyrpvomq.dd4xo3.top/67F5-5E77-3351-006D-F89C
http://pmenboeqhyrpvomq.vkm4l6.top/67F5-5E77-3351-006D-F89C
http://pmenboeqhyrpvomq.y5j7e6.top/67F5-5E77-3351-006D-F89C
http://pmenboeqhyrpvomq.onion.to/67F5-5E77-3351-006D-F89C
http://pmenboeqhyrpvomq.onion/67F5-5E77-3351-006D-F89C
Extracted
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.txt
cerber
http://pmenboeqhyrpvomq.wz139z.top/D43B-1E28-8721-006D-FB53
http://pmenboeqhyrpvomq.dd4xo3.top/D43B-1E28-8721-006D-FB53
http://pmenboeqhyrpvomq.vkm4l6.top/D43B-1E28-8721-006D-FB53
http://pmenboeqhyrpvomq.y5j7e6.top/D43B-1E28-8721-006D-FB53
http://pmenboeqhyrpvomq.onion.to/D43B-1E28-8721-006D-FB53
http://pmenboeqhyrpvomq.onion/D43B-1E28-8721-006D-FB53
Extracted
C:\Program Files\Microsoft Office\root\Templates\1033\ONENOTE\16\Stationery\# DECRYPT MY FILES #.html
Targets
-
-
Target
bf244a0d9ac81f0ca62e5b3ddfb7b72c_JaffaCakes118
-
Size
218KB
-
MD5
bf244a0d9ac81f0ca62e5b3ddfb7b72c
-
SHA1
ecbdbcfab600d5cfc2a1ce67bd5a1819ae340a33
-
SHA256
9abffaee18a87032e9db459d1309da167460acdd98dfc4c7fc4c3941f2cbbaf9
-
SHA512
d2f5d096b09446cb2c5ea99c33dad75b47e76cc5b0509c6d9d571d89b6f245ef86b3c63e4958d2766ef11f4483fb78af3cba49354912ed7c1f8a5497def44a53
-
SSDEEP
3072:2ELO8OxPh5XJkC456AhqDpl1nBTVS7R9WsL2VaAsJmzcsxoY9N/M75kDthsQxMWi:2EcNCCBAhqDNu7RhL2oAsUj/DgQxa
-
Cerber family
-
Adds policy Run key to start application
-
Contacts a large (523) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
6f5257c0b8c0ef4d440f4f4fce85fb1b
-
SHA1
b6ac111dfb0d1fc75ad09c56bde7830232395785
-
SHA256
b7ccb923387cc346731471b20fc3df1ead13ec8c2e3147353c71bb0bd59bc8b1
-
SHA512
a3cc27f1efb52fb8ecda54a7c36ada39cefeabb7b16f2112303ea463b0e1a4d745198d413eebb3551e012c84a20dcdf4359e511e51bc3f1a60b13f1e3bad1aa8
-
SSDEEP
96:zPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+y:zPtkuWJX7zB3kGwfy0nyUVsxCjOM61u
Score3/10 -
-
-
Target
405.htm
-
Size
1KB
-
MD5
1c7d2b2fddd34b82883053f74613a7f1
-
SHA1
5ded4a3340c5baa2f7875a09234200662a5fb6c5
-
SHA256
f42aa8b08eac61b29a5cddc51819a28a692b69480948f7d003485c0dbddedd8b
-
SHA512
2d54662a2a3f852d88e27232a93e5807bfa84be55460f4d9c9d2082d22e7818a337d75edb3fcdbf2fd5e6e34721722df16ada243576ace9598701a51797f50db
Score3/10 -
-
-
Target
SetCursor.dll
-
Size
13KB
-
MD5
eca26c61607b5b8f511f73a2c820de3d
-
SHA1
cfd03bc71cb462edb70a476c956ba8a9a9a44ea5
-
SHA256
ba57adfeaf6cbe5db7e19b428552900b083e3cbf19f0d1d30f5c35c9e01f51ea
-
SHA512
b9a065b75e5f8d81de2c2bc3333ab775450c13b7ec16ed7f17c3963e969b35a4cd4a71533ba7058e2f3398136727a1cb90c1e76a3d489379299d9c89278567fc
-
SSDEEP
384:17j7k5OLLP3qw3B3GqJjxYlumCB+ubIa:lj456DbB3rxxYlum6+u
Score3/10 -
-
-
Target
getOpenDocumentIDs.jsx
-
Size
175B
-
MD5
a6b21e84cfffda8936b29e7c9a99be33
-
SHA1
52c8d102768228cf95165ce94482efe077250693
-
SHA256
16aebcb843ceb74d45a814c633c1f2fc2577bc8ab485da16d20700efca8b80b7
-
SHA512
f049f65179fd715123f193f18c201ee23b05589dc16f9c08d4d04b4deabde2b01fb63cb905e09ed3bae6ce17ef290b26d19b66fb3a724399f450b0ba8d2ca4af
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1